-
1
-
-
84888442742
-
-
Amazon EC2 Crosses the Atlantic. http://aws.amazon.com/about-aws/whats- new/2008/12/10/amazon-ec2-crosses-the-atlantic/.
-
Amazon EC2 Crosses the Atlantic
-
-
-
2
-
-
84888447487
-
-
July 20, 2008
-
Amazon S3 Availability Event: July 20, 2008. http://status.aws.amazon. com/s3-20080720.html.
-
Amazon S3 Availability Event
-
-
-
5
-
-
84888472447
-
-
AOL apologizes for release of user search data
-
AOL apologizes for release of user search data. http://news.cnet.com/ 2100-1030-3-6102793.html.
-
-
-
-
6
-
-
68249129760
-
-
UCB/EECS-2009-28, EECS Department, University of California, Berkeley
-
Armbrust, M., Fox, A., Griffith, R. et al. Above the Clouds: A Berkeley View of Cloud Computing. UCB/EECS-2009-28, EECS Department, University of California, Berkeley, 2009.
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
-
7
-
-
74049102823
-
-
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Z., Peterson, and Song, D. Provable Data Possession at Untrusted Stores. In CCS. 2007.
-
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Z., Peterson, and Song, D. Provable Data Possession at Untrusted Stores. In CCS. 2007.
-
-
-
-
8
-
-
84888459398
-
-
Blue Cloud. http://www-03.ibm.com/press/us/en/pressrelease/26642.wss.
-
Blue Cloud
-
-
-
9
-
-
84888461650
-
-
Boneh, B., Di Crescenzo, G., Ostrovsky, R., and Persiano, G. Public Key Encryption with Keyword Search. In EUROCRYPT. 2004.
-
Boneh, B., Di Crescenzo, G., Ostrovsky, R., and Persiano, G. Public Key Encryption with Keyword Search. In EUROCRYPT. 2004.
-
-
-
-
11
-
-
0032201622
-
Private Information Retrieval
-
Chor, B., Kushilevitz, E., Goldreich, O., and Sudan, M. Private Information Retrieval. J. ACM, 45, 6 (1998), 965-981.
-
(1998)
J. ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
12
-
-
84888461072
-
-
CLOIDIFIN. http://community.zdnet.co.uk/blog/0,1000000567,2000625196b,00. htm?new-comment.
-
CLOIDIFIN. http://community.zdnet.co.uk/blog/0,1000000567,2000625196b,00. htm?new-comment.
-
-
-
-
15
-
-
84888468891
-
-
Disaster-Proofing The Cloud. http://www.forbes.com/2008/11/24/cio-cloud- disaster-tech-cio-cx-dw-1125cloud.html.
-
Disaster-Proofing The Cloud
-
-
-
16
-
-
84888454612
-
-
Don't cloud your vision. http://www.ft.com/cms/s/0/303680a6-bf51-11dd- ae63-0000779fd18c.html?nclick-check=1.
-
Don't cloud your vision
-
-
-
17
-
-
81255145028
-
-
EMC, Information-Centric Security. http://www.idc.pt/resources/PPTs/2007/ IT&Internet-Security/12.EMC.pdf.
-
Information-Centric Security
-
-
-
18
-
-
84888460602
-
-
End-User Privacy in Human-Computer Interaction. http://www.cs.cmu.edu/ ~jasonh/publications/fnt-end-user-privacy-in-human-computer-interaction-final. pdf.
-
End-User Privacy in Human-Computer Interaction. http://www.cs.cmu.edu/ ~jasonh/publications/fnt-end-user-privacy-in-human-computer-interaction-final. pdf.
-
-
-
-
23
-
-
84888444941
-
-
FTC questions cloud-computing security
-
FTC questions cloud-computing security. http://news.cnet.com/8301-13578- 3-10198577-38.html?part=rss&subj=news&tag=2547-1-3-0-20.
-
-
-
-
24
-
-
70350642087
-
-
Gentry, C. Fully Homomorphic Encryption Using Ideal Lattices. In STOC. 2009.
-
Gentry, C. Fully Homomorphic Encryption Using Ideal Lattices. In STOC. 2009.
-
-
-
-
25
-
-
84888462578
-
-
GoGrid API. http://www.gogrid.com/company/press-releases/gogrid-moves- api-specification-to-creativecommons.php.
-
GoGrid API
-
-
-
28
-
-
84888454561
-
-
How to Secure Cloud Computing. http://searchsecurity.techtarget.com/ magOnline/0,sid14-gci1349550,00.html.
-
How to Secure Cloud Computing. http://searchsecurity.techtarget.com/ magOnline/0,sid14-gci1349550,00.html.
-
-
-
-
32
-
-
84888470165
-
-
Loss of customer data spurs closure of online storage service 'The Linkup
-
Loss of customer data spurs closure of online storage service 'The Linkup'. http://www.networkworld.com/news/2008/081108-linkup-failure.html?page= 1.
-
-
-
-
34
-
-
84872255037
-
-
Netflix Prize. http://www.netflixprize.com/.
-
Netflix Prize
-
-
-
36
-
-
84888466994
-
-
Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing. http://www.worldprivacyforum.org/pdf/WPF-Cloud-Privacy-Report.pdf.
-
Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing. http://www.worldprivacyforum.org/pdf/WPF-Cloud-Privacy-Report.pdf.
-
-
-
-
41
-
-
84888465581
-
-
Shen, E., Shi, E., and Waters, B. Predicate Privacy in Encryption Systems. In TCC. 2009.
-
Shen, E., Shi, E., and Waters, B. Predicate Privacy in Encryption Systems. In TCC. 2009.
-
-
-
-
42
-
-
34548774576
-
Multi-Dimensional Range Query over Encrypted Data
-
Shi, E. Bethencourt, J., Chan, H., Song, D., and Perrig, A. Multi-Dimensional Range Query over Encrypted Data. In IEEE Symposium on Security and Privacy. 2007.
-
(2007)
IEEE Symposium on Security and Privacy
-
-
Shi, E.1
Bethencourt, J.2
Chan, H.3
Song, D.4
Perrig, A.5
-
44
-
-
84888452896
-
-
Storm clouds ahead. http://www.networkworld.com/news/2009/030209-soa- cloud.html?page=1.
-
Storm clouds ahead
-
-
-
45
-
-
84888471246
-
-
Sweeney, L. Weaving technology and policy together. J. of Law, Medicine and Ethics, 25, 2-3 (1997).
-
Sweeney, L. Weaving technology and policy together. J. of Law, Medicine and Ethics, 25, 2-3 (1997).
-
-
-
-
46
-
-
84888473271
-
-
Third Brigade. http://www.thirdbrigade.com.
-
Third Brigade
-
-
-
47
-
-
84888467518
-
-
VirtualPC vulnerability
-
VirtualPC vulnerability. http://www.microsoft.com/technet/security/ bulletin/ms07-049.mspx.
-
-
-
-
48
-
-
84888465112
-
-
VMWare vulnerability. http://securitytracker.com/alerts/2008/Feb/1019493. html.
-
VMWare vulnerability
-
-
-
49
-
-
84888465527
-
-
Waters, B. and Shacham, H. Compact Proofs of Retrievability. In ASIACRYPT. 2008.
-
Waters, B. and Shacham, H. Compact Proofs of Retrievability. In ASIACRYPT. 2008.
-
-
-
-
50
-
-
84888461647
-
-
is not being adopted
-
Why Google Apps is not being adopted. http://money.cnn.com/2008/08/19/ technology/google-apps.fortune/index.htm.
-
Why Google Apps
-
-
-
51
-
-
84888449976
-
-
Xen vulnerability. http://secunia.com/advisories/26986/.
-
Xen vulnerability
-
-
|